Correct Answers
Sharing details of your personal and professional lives or life online makes you
___________________ adversaries. - correct answers ✔✔more vulnerable to
Which of these activities must be reported? Select all that apply. - correct answers ✔✔-
bypassing security rules or protocols
-unauthorized disclosure of classified material
-inappropriate copying of classified material
Which of the countermeasures can you implement to help reduce technology-associated insider
threats? Select all that apply. - correct answers ✔✔-take security training courses
-prevent unauthorized data access
-use strong passwords
-keep unauthorized software from secure environments
A coworker shares that she and her husband are facing foreclosure, and she doesn't know what
to do. What should you do? Select all that apply. - correct answers ✔✔-suggest she contact the
EAP
-report the indicator to the security office
Insiders may include which of these groups of people? Select all that apply. - correct answers
✔✔-former employees
-contractors
-employees
-active duty military
, The definition of Targeted Violence includes which of these components? Select all that apply. -
correct answers ✔✔-directed at an individual or a group
-wrong
You observe a colleague with a sudden increased alcohol intake (e.g. frequent heavy
consumption, drinking until drunk) what is the appropriate action? - correct answers ✔✔-report
the concerning behavior to your security officier
Most inside offenders display concerning behaviors before acting directly against their
organization. This behavior may include (select all that apply): - correct answers ✔✔-violation of
workplace policies
-failure to follow standard procedures (SOP)
-legal difficulties
Which of these may be considered part of the media? Select all that apply. - correct answers
✔✔-not all of the answers
-not just newspaper reporter
Which of the following are things that adversaries want to know? Select all that apply. - correct
answers ✔✔-your organization's personnel
-countries your organization works with
-your company's competitors
_____________ is a a conversation technique used to discretely gather information that is not
readily available and do so without raising suspicion. - correct answers ✔✔Elicitation
Technological advances impact the insider threat by _____________. Select all that apply. -
correct answers ✔✔-increase risk of information loss